Phishing Trace
Scenario:
You are the cyber security expert for a government organization. There is great concern that hackers from another country will infiltrate the government network by using a phishing attack to interfere with our election process. One member send you an email that looks suspicious, in order to provide law enforcement with as much information as possible you decide to track the sender.
- You may use the attached email (.txt) the senders IP is highlighted or choose one from your own email
- Trace the IP to get a physical address (starting point)
- Share any other information you find that may be relevant to law enforcement
https://www.ip-tracker.org/ -- Trace the IP
Short Guides - You may need Google "how to view the source code for your specific" device, browser etc... also works on email that are not saved on your device.
Mac-- https://www.lifewire.com/view-message-source-os-x-mail-1172799
Outlook (Windows)--- https://www.extendoffice.com/documents/outlook/1794-outlook-view-email-source-code.html
Week 5 - trace IP Physical Location.rtf
- 2 years ago
- 5
Purchase the answer to view it
- EmailIPlookup.docx
- Prof. Dan.
- All Works solver
- Phd christine
- Young Kim hoods
- Rey writer
- AccA Eco Bus
- prof avril
- professor mitch
- brilliant answers
- nadia tutor
- perfecto
- Jessica Luis
- RESPECT WRITER
- Prof. Celine M.
- kite_sol
- Witness
- Dr Candice_2547
- Jenny Boom
- Homework Pro
- Urgent Tutor
- Moen Zafar
- Tiny Chris
- Angelina May
- Dr shamille Clara
- Terry Roberts
- kristine tutor
- imhmd.f
- ChrisProf
- DrNicNgao
- Phd isaac newton
- Wendy Lewis
- ansRohan
- kim woods
- Miss Professor
- EXCELLENT GRADES
- phyllis young
- ENS. writer
- DexterMasters
- university work
- Prof.MacQueen
- 00000PLAGIARISM
- Dr.Michelle_Prof
- PROFJUMAAA
- As soon as Possible
- sarapaul2013
- imtrqhasib
- KIBBZMORIA
- Ph.D A+ Grade
- Emily Clare
- fastestwriter1
- katetutor
- smart-tutor
- Jenifer Jones
- Emily Michael
- The Field of I/O Psychology
- Haiku Poems
- death penalty
- Mass Media: Development and Literacy Assignment Options
- Assignment week 2
- RAM Chip
- opinion 3.1 and 3.2
- Assignment
- Business Ethics
- Case Study 2: Enterprises Architecture Case Study Due Week 9 and worth 95 points The (enterprises architecture) EA process can be a...
Phissing Trace
NOT RATEDAttached Files:
Week 5 - trace IP Physical Location.rtf (38.189 KB)
Lab WK 5
Scenario:
You are the cybersecurityexpert for a government organization. There is great concern …
2 years agoPhishing Trace paper
NOT RATEDLab - Phishing Trace
Attached Files: Please see attached files.
Scenario:
You are the cybersecurityexpert for a government organization. There is great concern thathackers from another …
2 years agoLab - Phishing Trace
NOT RATEDLab WK 5
Scenario:
You are the cybersecurityexpert for a government organization. There is great concern thathackers from another country will infiltrate the government network by …
a year ago